Page 570 - StudyBook.pdf
P. 570

554    Chapter 9 • Basis of Cryptography

             8. If you wanted to encrypt a single file for your own personal use, what type of
                 cryptography would you use?

                 A. A proprietary algorithm
                 B. A digital signature
                 C. A symmetric algorithm
                 D. An asymmetric algorithm


             9. Which of the following algorithms are available for commercial use without a
                 licensing fee? (Select all that apply)
                 A. RSA
                 B. DES

                 C. IDEA
                 D. AES

             10. Which of the following characteristics does a one-way function exhibit? (Select
                 all that apply)
                 A. Easily reversible

                 B. Unable to be easily factored
                 C. Rarely get the same output for any two inputs
                 D. Difficult to determine the input given the output

             11. The process of using a digital signature to verify a person’s credentials is called:

                 A. Alertness
                 B. Integration

                 C. Authentication
                 D. Authorization

             12. A message is said to show integrity if the recipient receives an exact copy of
                 the message sent by the sender.Which of the following actions violates the
                 integrity of a message? (Choose all that apply)
                 A. Compressing the message

                 B. Spell checking the message and correcting errors
                 C. Editing the message
                 D. Appending an extra paragraph to a message

          www.syngress.com
   565   566   567   568   569   570   571   572   573   574   575